Comparative Investigation of Methods of Modular Exponentiation
نویسنده
چکیده
Main parameters of evaluation of modern information protection systems that implement RSA encryption algorithm are performance, RAM consumption and stability of algorithm of used method of modular exponentiation to the attacks on implementation, particularly in the temporal analysis. Methods of modular exponentiation (binary method, method and sliding window method) are characterized by the dependence of execution time of their algorithm on the key length and by the maximum number of used memory cells. Comparative investigation of operations of binary method, method and sliding window method of modular exponentiation with "left-to-right" and "right-to-left"reading bits of exponent was conducted. Algorithm of method of modularexponentiation has high performance and reasonable consumption of RAM.
منابع مشابه
Hydroponics Roofs for Saving Energy of Green Schools in the Cold and Dry climate of Iran: A Comparative Study between Two Broad and Modular Hydroponic Green Roofs
Green schools are a new type of school, in which the use of renewable energy is less than that of conventional schools. In this regard, nowadays, adding green layers to the roof of schools, in addition to increasing the Students' communication with nature, energy saving has improved in these spaces. However, to improve energy saving yield, the priority of these types of roofs in different clima...
متن کاملHigh-speed Algorithms for Public-key Cryptosystems in an e-Commerce Environment
Modular exponentiation is one of the most important operations in public-key cryptosystems. A modular exponentiation is composed of repetition of modular multiplications. Again, the modular multiplication consists of a multi-precision multiplication and a modular reduction. Therefore, we can reduce the execution time of the modular exponentiation by two methods. One is to reduce the number of m...
متن کاملEfficient Modular Exponentiation Architectures for RSA Algorithm
-Cryptosystems are used to send confidential messages in secure manner. The most important and efficient type of cryptosystem is RSA. RSA is used in various sectors such as Bank security and Internet protection. One of the various steps involved in RSA is Modular exponentiation, which is used in both Encryption and Decryption. It takes high memory and computation time of algorithm. In order to ...
متن کاملAdaptive Modular Exponentiation Methods v.s. Python's Power Function
In this paper we use Python to implement two efficient modular exponentiation methods: the adaptive m-ary method and the adaptive sliding-window method of window size k, where both m’s are adaptively chosen based on the length of exponent. We also conduct the benchmark for both methods. Evaluation results show that compared to the industry-standard efficient implementations of modular power fun...
متن کاملAST Pre-Processing For The Sliding Window Method Using Genetic Algorithms
Modular exponentiation is a cornerstone operation to several public-key cryptography systems such as the RSA. It is performed using successive modular multiplications. The latter is time consuming for large operands. Accelerating public-key cryptography software or hardware needs reducing the total number of modular multiplication needed. This paper introduces a novel idea based on genetic algo...
متن کامل